Phishing: Difference between revisions
Dana Silvia (talk | contribs) |
Dana Silvia (talk | contribs) |
||
Line 13: | Line 13: | ||
* The possibility of introducing a virus attack | * The possibility of introducing a virus attack | ||
* The development of a legitimate website copy | * The development of a legitimate website copy | ||
* Session Hijacking | |||
* Via instant messaging | * Via instant messaging | ||
* Fooling Internet users to submit financial and personal data or passwords | * Fooling Internet users to submit financial and personal data or passwords | ||
* Emails that claim to be sent on behalf of well-known organizations | * Emails that claim to be sent on behalf of well-known organizations | ||
* Data Theft | |||
* DNS-Based Phishing also referred to as "Pharming" <ref>[http://pcworld.about.com/od/emailsecurity/Types-of-Phishing-Attacks.htm Phishing types]</ref> | |||
* Voice phishing, which is a rather new form of phishing: users will receive an email allegedly from their favorite websites and will be requested to call a fraudulent number and update their information, which will then be stolen by the hacker.<ref>[http://www.spamlaws.com/voice-and-spear-phishing.html Voice phishing]</ref> | * Voice phishing, which is a rather new form of phishing: users will receive an email allegedly from their favorite websites and will be requested to call a fraudulent number and update their information, which will then be stolen by the hacker.<ref>[http://www.spamlaws.com/voice-and-spear-phishing.html Voice phishing]</ref> | ||
* Tabnabbing, which takes advantage of multiple tabs which Internet users may frequently use and redirects the Internet user to the wrong website. | * Tabnabbing, which takes advantage of multiple tabs which Internet users may frequently use and redirects the Internet user to the wrong website. <ref>[http://www.crustiz.com/web-2-0/tabnagging-new-phishing-attack/ Tabnagging]</ref> | ||
* Pop-up windows which may appear from legitimate and original websites but request financial and credential information. | * Pop-up windows which may appear from legitimate and original websites but request financial and credential information. | ||
==Protection against phishing practices== | ==Protection against phishing practices== |